Uploaded image for project: 'OpenShift Hosted Control Plane'
  1. OpenShift Hosted Control Plane
  2. HOSTEDCP-1256

Create a short lived signer with rotation for signing customer certs


    • Icon: Story Story
    • Resolution: Done
    • Icon: Major Major
    • openshift-4.15
    • None
    • None
    • None
    • Hypershift Sprint 249
    • 0
    • 0
    • 0

      Create a new short-lived signer CA that signs a cluster-admin kubeconfig we provide to the customer upon request.

      The CA must be trusted by the KAS and included in the CA bundle along with the CA that will sign longer lived cert-based creds like those used by SRE.

      TBD: should we create the signer at the point of kubeconfig request from the customer?  Or should we always have the signer active through periodic rotation?

      On-demand signer:

      • Pro: the kubeconfig will be valid for the entire lifetime of the signer
      • Con: we have to rollout the KAS deployment with the new signer which adds latency to the kubeconfig request from the customer. The signer generation will be fast so we could generate the kubeconfig quickly, but it wouldn't be reliably honored by the KAS until the rollout is complete (~10-15m)

      Always valid signer with rotation:

      • Pro: kubeconfig generation/publish is fast and near immediately honored by the KAS
      • Con: the kubeconfig could be valid for a very short period of time if the signer is just about to rotate when the request for the kubeconfig is made

            skuznets@redhat.com Steve Kuznetsov
            sjenning Seth Jennings
            Jie Zhao Jie Zhao
            0 Vote for this issue
            4 Start watching this issue